Authentication Methods

Recognize, explain, and differentiate authentication methods.

Authentication is the process used to identify an agent requesting the use of resources. An authentication request can be presented by any of the following agents:

  • Human

  • Computer system

  • Network device, such as a router or switch

  • Software program

Authentication can take place locally on a single computer system or be passed over a network to a centralized authentication system. In each of these situations, the purpose of authentication is to associate a set of credentials (supplied by the agent) with an electronic ID. The electronic ID can then be granted (or denied) access to resources, group membership, and rights on the network and its computer systems.

Authentication ...

Get Security+ Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.